Question: Explain the process of creating a public and private key in the software in 2 paragraphs. In this assignment you will encrypt the body of
Explain the process of creating a public and private key in the software in paragraphs.
In this assignment you will encrypt the body of an email message and send me the encrypted message.
I will decrypt the message providing you include a specific piece of information what information should you also send with the email? Explain it in the email you encrypt.
I will send you an encrypted response to the email and you will decrypt the message and upload it to black board along with the answers to the questions for this assignment.
This is my public key:
BEGIN PGP PUBLIC KEY BLOCK
mQINBGVtioBEADBklXxazdnhFZhMCsbNzGVeVFggomPzxxeXtJinfqbd
bEGICagLhDDPogACbRwpcuEFRFulOjigWRvwrQeXiEVQIqTBxLFCClPz
KvCzQpCXXBVkMskkvDaFyjVEkSGosjFKVZxoeAzJuMCDJujidypOW
QDOVKlJqTNwqajxvisshzpFBvDyvbjeCkdiGDvLWnqyqlWCNRutScsi
kKXxEjFFyvGYWDDSHJUGJrMVzRhrkBLiCYRSzTRUpNpAMmrdkLSsiCLF
cApUUhhmKaPTiRWpQbmxxdCDrLInzMyobjCaNotAOzADJBk
mBDeazWIYUGZmSLofThhOYvLXdhNoAjGAjfQmxBTlkisLSCjjOJhwX
OanBhnKBbBIFpqCYysiZMYAoOfwsXFYoYvdcgAsaOlNcZTQgEgwuig
QfJeHgYIxKTAJXmIHQRHrofoDiOnBLkucGevOgDhJLoWBhkaQ
ueCurAgsYZsyAypmxuCuEedLfqXHcNghDzigRyuCfZwLvqXSWQrOL
ThiSdqzchVDkBkBnIoNpodpoNutJYkvdTmrTmgAZjubwARAQAB
tCGYWhlZWgQWJkdXItUmFemFhcSAZihYmRcnJhenphYXFAZhaWwuYt
PokCVwQTAQgAQRYhBAMBuMRMCArQTxzxxzhEoBQJlbeqAhsDBQkHhhZ
BQsJCAcCAiICBhUKCQgLAgQWAgMBAhHAheAAAoJEOxxzhEofEPRmBt
tUeaAIPqdAvWOWPYimoRhnetbEeNZnTVyleDcYWjfRFJIcBcVOh
jbJygkZjAkOfNdqDYVcerUwsVSKrrkqYYRbgylKOfkBTejJkU
fKarOcwBRSdVEjIeCsPYxKTMtwpYziWYDUtqqqXPpkyQTiHknDLhjTRYr
IvfkTWxLLMOcrpwmqzvIsKFgbAIYLftrzvndNmJRGHVeJJhAI
QzIVfQFLiJZhONeeUTbqUftRReCytKMwBSzOkdstoxHVeyyvJUaj
QKuUwZNEvlwLIGYbZXOdQPoMDSnypQtanCLxexbtxjxYlYcHrWvDDfHK
OwUZxVrTRSUffACUlnMzAFrjiVDCGfJZzkvEFcxrrgtLmRqBMTq
PwfYICrnVqBMCReqFSlkAAanSTtMYHQEGSukKbguQLAIKGivOpJSeMq
AHhwoAgitlEloYwERJkyWGJhMShQVfyWKkiqlcBxceRnykyQOAzmmzcDvzkx
LJIUPaLYBeSPhfGODGvtJBdTwoVkregQBBjVarzjJiZUZpO
KbmfuZCsfZGpIxTQrjshUIZzlWcrRuQINBGVtioBEACkXwnGyRVOELu
cgEKOMljdwnkDlgfmxuofKRCzoZrdOwzjxyIYpVQFOpomKwrkLPO
IoPklBgOGOYDkGfQyqzuIOSiAcnZTlfDsiGznTvdygYsCesvzBWw
utFbwgUPgpALndYgvAYpybLCdYunHqKgKgVIwsrTOsPcHFHUkfPf
GspbrBWitJdamLyKYDRbQMpYAMoIYeYURjkReyfVIyETmnoVfRe
pfEWzxyyQpsNcJLunuTKIWakUlWJBzBaJFGIOmIsWtOBBjEfb
SWIlYaUqSMJqjOwavLvKpYabBzumrAvmFlyqaBjlNqIf
tutqNHqVgrivpiKLzAZLJeiPLOOPYEXtPbMwAMWdoOUUqdtVIWAgRcLl
aJxheXZMyaukOSuuhSBCngmOjSnVOliECPDHnyrZElelSvAPqyP
edsqtDoNEyQtPQAVsUowgRvnntoNlQHrLUNHttyyEuTmTKqPUzXPAXG
CGyxLemNWXHWTSJJZvITENzjOQClmpxUynEEKwbyxUMKtOMXtWTk
YWVxUECtEWoGNWANHTDVFblwARAQABiQIBBgBCAAmFiEEAwGzREwICtD
RPHPHHPqESjrFAmVtioCGwwFCQeGHkACgkQHHPqESjrdiAZYFhVr
VRfcpYoduwMOccEMHkICzBuGDyftjYrYhvylyOIYYziUdGFKwM
BCeklIUPIUqAPoTlHzuNgmTnqbOkukUgCYSZXIhQQCHTr
VFnjvUyRWKiukPUigqlHelOLUquzGfZaBBwciCiwqaUlmvRUBtD
fdXUerktrlaCHNlunqfOIUQKnncBuojpMapfxVqwriKEZXByTPAzDG
AQmmdGdIcNvHLyNjGQjBSJZdGqBoSsfiIWFkULMzIPubatWuj
VaHkieKGDvieXrLyanOnEAPcarzRyjwDMaCFfPBTjNbqtmDBdxMckFmH
rnyxYWvHfVbXMMbPGuWaZQpOHGFRNpTgYjurKOsgVaxvQPPRipYTHkVPzf
zEkZmNcrCqybhfGdlkSBLHbZwrsKoxVCyddwvrXBMneigWMoWGBKtSTT
UZVIQyPJwZTaIAgMmMdFlQraYkCDyibcZrGpsVZVmlXGXwwi
qUmyywZaYUXEZMSxhvbocbIBguInemfbwESdLDaSiPnMaodpnUCCc
NHwOmUrMnxUJpDuYCgMbiJKIg
Uky
END PGP PUBLIC KEY BLOCK
In your software, look up my public key. Did it find it Does it match what I provided?
Install the software and encrypt the message you want to send me
Which key did you encrypt the message with?
Note: Conduct some independent research to understand the concept of encrypted emails. This is loosely based on information from chapter
Take a screen shot of the decrypted message I send you and upload the answers to the questions with the screen shots to bright space.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
